================================ WARNING: inconsistent lock state 6.1.100-syzkaller #0 Not tainted -------------------------------- inconsistent {HARDIRQ-ON-W} -> {IN-HARDIRQ-W} usage. syz.0.65/3836 [HC1[1]:SC0[0]:HE0:SE1] takes: ffff8880b9835e90 (lock#10){?.+.}-{2:2}, at: local_lock_acquire include/linux/local_lock_internal.h:29 [inline] ffff8880b9835e90 (lock#10){?.+.}-{2:2}, at: __mmap_lock_do_trace_acquire_returned+0x84/0x670 mm/mmap_lock.c:237 {HARDIRQ-ON-W} state was registered at: lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662 local_lock_acquire include/linux/local_lock_internal.h:29 [inline] __mmap_lock_do_trace_acquire_returned+0x9d/0x670 mm/mmap_lock.c:237 __mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline] mmap_read_trylock include/linux/mmap_lock.h:137 [inline] get_mmap_lock_carefully mm/memory.c:5304 [inline] lock_mm_and_find_vma+0x219/0x2e0 mm/memory.c:5366 do_user_addr_fault arch/x86/mm/fault.c:1312 [inline] handle_page_fault arch/x86/mm/fault.c:1431 [inline] exc_page_fault+0x169/0x620 arch/x86/mm/fault.c:1487 asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:570 irq event stamp: 4980 hardirqs last enabled at (4979): [] syscall_enter_from_user_mode+0x2e/0x230 kernel/entry/common.c:117 hardirqs last disabled at (4980): [] sysvec_call_function_single+0xa/0xb0 arch/x86/kernel/smp.c:262 softirqs last enabled at (3790): [] local_bh_disable include/linux/bottom_half.h:20 [inline] softirqs last enabled at (3790): [] fpregs_lock arch/x86/include/asm/fpu/api.h:72 [inline] softirqs last enabled at (3790): [] fpu_clone+0x258/0xc80 arch/x86/kernel/fpu/core.c:602 softirqs last disabled at (3788): [] local_bh_disable include/linux/bottom_half.h:20 [inline] softirqs last disabled at (3788): [] fpregs_lock arch/x86/include/asm/fpu/api.h:72 [inline] softirqs last disabled at (3788): [] fpu_clone+0x258/0xc80 arch/x86/kernel/fpu/core.c:602 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(lock#10); lock(lock#10); *** DEADLOCK *** 2 locks held by syz.0.65/3836: #0: ffffffff8d12ad40 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:350 [inline] #0: ffffffff8d12ad40 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:791 [inline] #0: ffffffff8d12ad40 (rcu_read_lock){....}-{1:2}, at: __bpf_trace_run kernel/trace/bpf_trace.c:2272 [inline] #0: ffffffff8d12ad40 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run2+0x110/0x410 kernel/trace/bpf_trace.c:2312 #1: ffff888022170158 (&mm->mmap_lock){++++}-{3:3}, at: mmap_read_trylock include/linux/mmap_lock.h:136 [inline] #1: ffff888022170158 (&mm->mmap_lock){++++}-{3:3}, at: stack_map_get_build_id_offset+0x232/0x9c0 kernel/bpf/stackmap.c:144 stack backtrace: CPU: 0 PID: 3836 Comm: syz.0.65 Not tainted 6.1.100-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e3/0x2cb lib/dump_stack.c:106 valid_state+0x136/0x1c0 kernel/locking/lockdep.c:3969 mark_lock_irq+0xa8/0xba0 kernel/locking/lockdep.c:4172 mark_lock+0x21c/0x340 kernel/locking/lockdep.c:4628 mark_usage kernel/locking/lockdep.c:4520 [inline] __lock_acquire+0xb40/0x1f80 kernel/locking/lockdep.c:5003 lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662 local_lock_acquire include/linux/local_lock_internal.h:29 [inline] __mmap_lock_do_trace_acquire_returned+0x9d/0x670 mm/mmap_lock.c:237 __mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline] mmap_read_trylock include/linux/mmap_lock.h:137 [inline] stack_map_get_build_id_offset+0x99e/0x9c0 kernel/bpf/stackmap.c:144 __bpf_get_stack+0x495/0x570 kernel/bpf/stackmap.c:452 ____bpf_get_stack_raw_tp kernel/trace/bpf_trace.c:1877 [inline] bpf_get_stack_raw_tp+0x1b2/0x220 kernel/trace/bpf_trace.c:1867 bpf_prog_ec3b2eefa702d8d3+0x3a/0x3e bpf_dispatcher_nop_func include/linux/bpf.h:989 [inline] __bpf_prog_run include/linux/filter.h:603 [inline] bpf_prog_run include/linux/filter.h:610 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2273 [inline] bpf_trace_run2+0x1fd/0x410 kernel/trace/bpf_trace.c:2312 trace_tlb_flush+0x151/0x1a0 include/trace/events/tlb.h:38 flush_tlb_func+0x4e3/0x620 arch/x86/mm/tlb.c:875 __flush_smp_call_function_queue+0x2d9/0xd00 kernel/smp.c:641 __sysvec_call_function_single+0xbb/0x360 arch/x86/kernel/smp.c:267 sysvec_call_function_single+0x89/0xb0 arch/x86/kernel/smp.c:262 asm_sysvec_call_function_single+0x16/0x20 arch/x86/include/asm/idtentry.h:661 RIP: 0010:__syscall_enter_from_user_work kernel/entry/common.c:97 [inline] RIP: 0010:syscall_enter_from_user_mode+0x37/0x230 kernel/entry/common.c:118 Code: 49 89 fe 48 8b 7c 24 30 e8 f6 fa ff ff 0f 1f 44 00 00 0f 1f 44 00 00 e8 a7 fe 05 f7 e8 22 fd 05 f7 fb 65 4c 8b 3d 39 0f 77 75 <49> 8b 5f 08 f6 c3 3f 0f 84 ad 00 00 00 f6 c3 20 74 17 4c 89 f7 e8 RSP: 0018:ffffc9000542fef8 EFLAGS: 00000282 RAX: f6c8ac31017c1d00 RBX: ffffc9000542ff30 RCX: ffffffff91c94103 RDX: dffffc0000000000 RSI: ffffffff8aec0240 RDI: ffffffff8b3d48a0 RBP: ffffc9000542ff48 R08: dffffc0000000000 R09: fffffbfff1ce7086 R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 R13: 000000000000000e R14: ffffc9000542ff58 R15: ffff888074293b80 do_syscall_64+0x1e/0xb0 arch/x86/entry/common.c:77 entry_SYSCALL_64_after_hwframe+0x68/0xd2 RIP: 0033:0x7fbc7032cead Code: 1a 00 4c 8d 7c 24 58 c6 44 24 56 00 41 ba 08 00 00 00 31 ff c6 44 24 57 00 4c 89 fa b8 0e 00 00 00 48 8d 35 45 a6 0c 00 0f 05 <49> 8b 44 24 28 48 85 c0 0f 84 65 02 00 00 80 b8 90 00 00 00 00 0f RSP: 002b:00007ffe6e90abe0 EFLAGS: 00000246 ORIG_RAX: 000000000000000e RAX: ffffffffffffffda RBX: 00007fbc7112b6c0 RCX: 00007fbc7032cead RDX: 00007ffe6e90ac38 RSI: 00007fbc703f74f0 RDI: 0000000000000000 RBP: 0000000000000000 R08: 00000000000201c0 R09: 0000000000000000 R10: 0000000000000008 R11: 0000000000000246 R12: 00007ffe6e90ae30 R13: 00007fbc7110b000 R14: 00007fbc7112b6c0 R15: 00007ffe6e90ac38 ---------------- Code disassembly (best guess): 0: 49 89 fe mov %rdi,%r14 3: 48 8b 7c 24 30 mov 0x30(%rsp),%rdi 8: e8 f6 fa ff ff call 0xfffffb03 d: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 12: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 17: e8 a7 fe 05 f7 call 0xf705fec3 1c: e8 22 fd 05 f7 call 0xf705fd43 21: fb sti 22: 65 4c 8b 3d 39 0f 77 mov %gs:0x75770f39(%rip),%r15 # 0x75770f63 29: 75 * 2a: 49 8b 5f 08 mov 0x8(%r15),%rbx <-- trapping instruction 2e: f6 c3 3f test $0x3f,%bl 31: 0f 84 ad 00 00 00 je 0xe4 37: f6 c3 20 test $0x20,%bl 3a: 74 17 je 0x53 3c: 4c 89 f7 mov %r14,%rdi 3f: e8 .byte 0xe8